FreeBSD Project Information for VU#228519

Wi-Fi Protected Access (WPA) handshake traffic can be manipulated to induce nonce and session key reuse



Vendor Statement

FreeBSD users leveraging WPA2 should monitor the FreeBSD-announce mailing list and/or the Security Information webpage ( for further information regarding how this vulnerability applies to FreeBSD.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References


There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.